Chapter 10: Electronic Commerce Security
Electronic Commerce, Seventh Annual Edition2 Impact of Security on E-Commerce In 2006 an estimated $913 million e-commerce sales lost because of security concerns. Another $1 billion lost because of shoppers refusing to shop online due to security concerns. Nearly half of all online U.S. adults have concerns about online information security It impacts all Online Commerce online commerce (online banking, online shopping and Gartner, Inc
Electronic Commerce, Seventh Annual Edition3 Security for Client Computers First-party cookies –Cookies placed on a client computer by a Web server site Third-party cookies –Originates on a Web site other than the site being visited (e.g., DoubleClick) Web bug –Tiny 1-pixel graphic that a third-party Web site places on another site’s Web page to track activity. (Also – Web Beacon, Transparent Gif)
Electronic Commerce, Seventh Annual Edition4 A Web Bug Scenario Here a 3rd-party tracking site is tracking how much merchandise was purchased for a particular banner ad campaign. In this scenario the individual user remains anonymous, even though their buying habits are disclosed.
Electronic Commerce, Seventh Annual Edition5
6 ActiveX Controls An ActiveX control is an object containing programs and properties that Web designers place on Web pages ActiveX components can be constructed using different languages programs but the most common are C++ and Visual Basic Intended for creating Website functionality but can be used to create malicious content.
Electronic Commerce, Seventh Annual Edition7 Scripting Languages JavaScript developed by Netscape to enable Web page designers to build active content Intended for creating Website functionality but can also be used to create malicious content.
Electronic Commerce, Seventh Annual Edition8 Digital Certificates A Digital Certificate is signed code that Authenticates the Sender. Issued by a Certification authority like Verisign or Thawte.
Electronic Commerce, Seventh Annual Edition9
10 Encryption Highlights Symmetric Encryption encodes a message with two private keys. Asymmetric Encryption uses a Public & Private Key. Asymmetric Encryption is used in typical Web- based E-Commerce. (SSL & SET) Pretty Good Privacy (PGP) is used to encrypt messages
Electronic Commerce, Seventh Annual Edition11 Hash Functions Used to ensure Message Integrity. Used to encrypt a Digital Signature Hash algorithms are one-way functions –There is no way to transform the hash value back to the original message
Electronic Commerce, Seventh Annual Edition12 Hash Digest
Electronic Commerce, Seventh Annual Edition13 Public Key Cryptography with Digital Signatures Secure Socket Layers (SSL) Protocol encrypted by the Hash function)) is received in a Digital Certificate)
Electronic Commerce, Seventh Annual Edition14 SECURITY DIMENSION ASPECT OF SECURITY PROVIDED HOW IS IT ACHIEVED? Integrity Protects from Alteration Hash Coding Non-Repudiation Proof Transaction Occurred 1-Server Log Files 2 - Digital Signature – Provides a Time Stamp (can use a Digital Time Stamp Service) AuthenticityProof of IdentityDigital Signature Privacy & Confidentiality Keeping Messages Private Encryption Availability & Authorization (Necessity) Controlling AccessPasswords, Access Levels, Policies & Procedures 5 Dimensions of E-Commerce & Network Security